
×
Distributed Computing and Internet Technology
First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings
herausgegeben von R.K. Ghosh und Hrushikesha MohantyInhaltsverzeichnis
- Plenary Talk – I.
- Taming the Dynamics of Disributed Data.
- DISTRIBUTED COMPUTING.
- Data in Your Space.
- Enabling Technologies for Harnessing Information Explosion.
- Fair Leader Election by Randomized Voting.
- An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks.
- Distributed Balanced Tables: A New Approach.
- Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster.
- Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric.
- A Scalable and Robust QoS Architecture for WiFi P2P Networks.
- NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity.
- Energy Efficient Cache Invalidation in a Disconnected Mobile Environment.
- An Efficient Data Dissemination Schemes for Location Dependent Information Services.
- A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts.
- A Nested Transaction Model for LDAP Transactions.
- Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks.
- An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems.
- Cybersecurity: Opportunities and Challenges.
- INTERNET TECHNOLOGY.
- Vulnerabilities and Threats in Distributed Systems.
- A TNATS Approach to Hidden Web Documents.
- Querying XML Documents from a Relational Database in the Presence of DTDs.
- SAQI: Semantics Aware Query Interface.
- Hybrid-Chord: A Peer-to-Peer System Based on Chord.
- A Generic and Flexible Model for Replica Consistency Management.
- An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks.
- The Roles of Ontology and Metadata Registry for Interoperable Databases.
- DHL: Semantically Rich Dynamic and Active Hyperlinks.
- User-Class Based Service Acceptance Policy Using ClusterAnalysis.
- SOFTWARE ENGINEERING.
- Tools and Techniques for Multi-site Software Development.
- Specifying a Mobile Computing Infrastructure and Services.
- Generating a Prototype from a UML Model of System Requirements.
- A Type System for an Aspect Oriented Programming Language.
- Secure Requirements Elicitation Through Triggered Message Sequence Charts.
- Framework for Safe Reuse of Software Binaries.
- Supporting Partial Component Matching.
- A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs.
- Pattern Semantic Link: A Reusable Pattern Representation in MDA Context.
- Compatibility Test and Adapter Generation for Interfaces of Software Components.
- A Modern Graphic Flowchart Layout Tool.
- SYSTEMS SECURITY.
- A Flexible Authorization Framework for E-Commerce.
- Efficient Algorithms for Intrusion Detection.
- Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection.
- Using Schemas to Simplify Access Control for XML Documents.
- Automatic Enforcement of Access Control Policies Among Dynamic Coalitions.
- Implementing Consistency Checking in Correlating Attacks.
- LSAD: Lightweight SYN Flooding Attack Detector.
- UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks.
- Tracing Attackers with Deterministic Edge Router Marking (DERM).
- Distributing Key Updates in Secure Dynamic Groups.
- Succinct and Fast Accessible Data Structures for Database Damage Assessment.
- A Secure Checkpointing Protocol for Survivable Server Design.
- MobiCoin: Digital Cash for M-Commerce.
- Cellular Automata: An Ideal Candidate for a Block Cipher.
- NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images.
- WORKSHOP ON DATAMINING, SECURITY & APPLICATION.
- Improving Feature Selection in Anomaly Intrusion Detection Using Specifications.
- Towards Automatic Learning of Valid Services for Honeypots.